GoGreen PC Tune-Up™
Learn More

this is how ssl encrypt our websites
MTNCOMP | List View | Table View


myBlog Home


Internet security and bandwidth monitoring

by Mountain Computers Inc., Publication Date: Wednesday, August 26, 2020
View Count: 834, Keywords: IDS, IPS, Internet, Bandwidth, Monitoring, Hashtags: #IDS #IPS #Internet #Bandwidth #Monitoring

Threat detection and protection is at an all time high across the Internet.
Technologies do exist for a minor annual fee for some larger big iron carriers of edge computing and appliances.
Advance Threat Protection (ATP) on some appliances will defend and alert you based on deep packet inspection. In the past 20 years, small businesses did not have the money to afford the edge appliances and their horsepower, even your Network As A Service offloading had challenges.
Continue to monitor your traffic and have regular KPIs on what is normal and what is abnormal traffic. The following threat maps help you realize a bit visually what we are dealing with on a second by second basis. Your log files on our edge devices if you have fail2ban or other flow logs being captured and analyzed of threats identified and blocked.
Here are some threat maps that show live traffic (not too much latency in reporting):
Remember, an ounce of prevention is worth a pound of cure.
Now, we are seeing network appliances and pricing coming down pretty fast and companies that are in the horizontal and vertical around edge security are coming to the mainstream for all businesses, not just enterprise. That is good news!!
more to come...

if you found this article helpful, consider contributing $10, 20 an Andrew Jackson or so..to the author. more authors coming soon
FYI we use paypal or patreon, patreon has 3x the transaction fees, so we don't, not yet.

© 2024 myBlog™ v1.1 All rights reserved. We count views as reads, so let's not over think it.